Cyber Security - Maalot Educational Network
Organization
- Art/Graphics - Maalot Educational Network
- Business/Accounting - Maalot Educational Network
- Computer Science - Maalot Educational Network
- Cyber Security - Maalot Educational Network
- Education - Maalot Educational Network
- English - Faith Builders Educational Programs
- Hebrew - Maalot Educational Network
- History - Maalot Educational Network
- Judaic Studies/Religion - Maalot Educational Network
- Mathematics - Maalot Educational Network
- Philosophy - Maalot Educational Network
- Psychology and Sociology - Maalot Educational Network
- Retired Learning Experiences - Maalot Educational Network
- Speech Pathology - Maalot Educational Network
- Talmud Courses - Maalot Educational Network
Descriptions and credit recommendations for all evaluated learning experiences
Classroom: 54 hours (15 weeks). Distance / hybrid: Varies.
September 2017 - Present.
Upon successful completion of the course, students will be able to: recognize the common cyber-attack methods, threats, and computer vulnerabilities; strategize, select, and apply appropriate ethical web hacking methods; carry out network scanning techniques and scanning countermeasures; differentiate between viruses and apply virus analysis; recognize and evaluate computer worms; apply malware analysis procedures and countermeasures; and carry out various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps to manage cyber security risks to valued assets.
Major topics include: Ethical and Cyber security terminology, methodologies and framework, Operating Systems including Windows and Linux, Cyber Malware and attack methods, network mapping, web applications penetration testing, exploitation and vulnerability assessment, sniffing, and social engineering. Prerequisites: Personal interview and skill-based exam.
In the lower division baccalaureate/associate degree category, 3 semester hours in Cyber Security, Computer Forensics, Digital Forensics, Information Technology, Introduction to Computer Science, or as a general elective (5/18) (3/21 revalidation).
Classroom: 54 hours (15 weeks). Distance/ hybrid: Varies.
September 2017 - Present.
Upon successful completion of the course, students will able to: analyze data found on digital storage media that might provide evidence of wrong-doing; select and apply computer forensics tools used in data analysis, such as searching, absolute disk sector viewing and editing, recovery of files, password cracking, etc.; investigate an infected system and determine that all necessary data was collected to understand the attack method; identify and analyze the stages an ethical hacker requires to take in order to compromise a target system.; analyze basic malwares – basic static and dynamic analysis; and analyze network traffic, identify common attacks like MITM, ARP Poisoning and Spoofing.
Major topics include: cyber security threats, attacks and fraud; forensics methodology; digital forensics; familiarity with network forensics; and Malware analysis. Prerequisite: Prior knowledge of cyber concept, high technical ability, proficiency in English and creative thinking.
In the lower division baccalaureate/associate degree category, 3 semester hours in Cyber Security, Computer Forensics, Digital Forensics, Information Technology, Introduction to Computer Science, or as a general elective (5/18) (3/21 revalidation).
Classroom: 54 hours (15 weeks). Distance/hybrid: Varies.
September 2017 - Present.
Upon successful completion of the course, will have developed a security mindset that will empower them to work more securely as both a developer and a user. The student will be able to recognize and differentiate between cyber security terms used in the profession; recognize system wide threats and vulnerabilities and use common hacking techniques; distinguish between common defense tools for endpoints, servers and cloud computing. Simulate a network environment using virtualization in order to monitor intrusions and how they are detected by antivirus, anti-malware and firewalls; manage and recognize cyber security risks to valued assets at intrusion points in a network; implement the requirements of ISO and GDPR; create a risk assessment and mitigation strategy; use basic hacking tools to discover vulnerabilities; implement operating system security hardening and patching; use GPO to implement technical and operational controls; demonstrate an understanding of cryptology and of the importance of encrypting secure data.
Topics covered are: cyber security terminology and framework, network infrastructure and OSI (open systems interconnection) model, cyber threats and attacks, introduction to cryptography, security and incident management, security standards and regulations, and defense methodologies. Prerequisites: Personal interview and skill-based exam.
In the lower division baccalaureate/associate degree category, 3 semester hours in Cyber Security, Data Analysis, Digital Forensics, Information Technology, Introduction to Computer Science or as a general elective (5/18) (3/21 revalidation).